Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreIn present work the effort has been put in finding the most suitable color model for the application of information hiding in color images. We test the most commonly used color models; RGB, YIQ, YUV, YCbCr1 and YCbCr2. The same procedures of embedding, detection and evaluation were applied to find which color model is most appropriate for information hiding. The new in this work, we take into consideration the value of errors that generated during transformations among color models. The results show YUV and YIQ color models are the best for information hiding in color images.
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreBackground: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o
... Show MoreIn this investigation, metal matrix composites (MMCs) were manufactured by using powder technology. Aluminum 6061 is reinforced with two different ceramics particles (SiC and B4C) with different volume fractions as (3, 6, 9 and 12 wt. %). The most important applications of particulate reinforcement of aluminum matrix are: Pistons, Connecting rods etc. The specimens were prepared by using aluminum powder with 150 µm in particle size and SiC, B4C powder with 200 µm in particle size. The chosen powders were mixed by using planetary mixing setup at 250 rpm for 4hr.with zinc stearate as an activator material in steel ball milling. After mixing process the powders were compacted by hydraulic
... Show MoreBackground: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m
... Show More